Sciweavers

373 search results - page 8 / 75
» Querying Priced Information in Databases: The Conjunctive Ca...
Sort
View
100
Voted
ICDT
2012
ACM
251views Database» more  ICDT 2012»
13 years 17 hour ago
Computing universal models under guarded TGDs
A universal model of a database D and a set Σ of integrity constraints is a database that extends D, satisfies Σ, and is most general in the sense that it contains sound and co...
André Hernich
ICDT
2009
ACM
119views Database» more  ICDT 2009»
15 years 10 months ago
Incremental XPath evaluation
We study the problem of incrementally maintaining an XPath query on an XML database under updates. The updates we consider are node insertion, node deletion, and node relabeling. ...
Henrik Björklund, Marcel Marquardt, Wim Marte...
ICDT
2005
ACM
128views Database» more  ICDT 2005»
15 years 3 months ago
First-Order Query Rewriting for Inconsistent Databases
We consider the problem of retrieving consistent answers over databases that might be inconsistent with respect to some given integrity constraints. In particular, we concentrate o...
Ariel Fuxman, Renée J. Miller
ICDT
2007
ACM
105views Database» more  ICDT 2007»
15 years 3 months ago
Optimization of Query Plans in the presence of Access Limitations
We consider the problem of querying data sources that have limited capabilities and can thus only be accessed by complying with certain binding patterns for their attributes. This ...
Andrea Calì, Diego Calvanese, Davide Martin...
ICDT
2007
ACM
107views Database» more  ICDT 2007»
15 years 3 months ago
Privacy in GLAV Information Integration
Abstract. We define and study formal privacy guarantees for information integration systems, where sources are related to a public schema by mappings given by source-to-target dep...
Alan Nash, Alin Deutsch